Help RSS API Feed Maltego Contact                        

Domain > back.rooter.tk

This indicator is referenced in AlienVault OTX pulse ""

Is this malicious?

Most users have voted this as MALICIOUS

Reports

http://researchcenter.paloaltonetworks.com/2015/11...    
https://otx.alienvault.com/pulse/565622074637f2388...    

Files that talk to back.rooter.tk

MD5A/V
bfa8ea27da428443cd21f9eef92b495a[Exploit-CVE2012-0158.h!rtf] [Exploit.MSWord.CVE-2012-0158.bn] [Exp/20120158-A] [HEUR_RTFEXP.A] [Exploit.CVE-2012-0158.a] [Exploit/Cve-2012-0158] [MSOffice/CVE20120158.fam!exploit] [virus.exp.20120158]
b79481d9dc8e95b9588699d327aa0657
4c37ec9f600ad90381df2ccdcb00b0e6[Shellcode.B] [Exploit.SWF.CVE-2013-0634.b] [Exploit.SWF.CVE-2013-0634]
6fa591d04f39722b1b908fe6fe37afbf
3237cc3490bb2ffe4877b087fd71e7b9[Backdoor.Tebit.a] [Suspicious.Cloud.5] [Backdoor.Win32.Tebit.a] [Trojan.Win32.Tebit.ctsnch] [UnclassifiedMalware] [Trojan.DownLoader9.5935] [TR/Rogue.1472692] [Trojan[Backdoor]/Win32.Tebit] [W32/Trojan.UEIN-8641] [Backdoor.Tebit] [Backdoor.Win32.Tebit.auzs] [Backdoor.Win32.Tebit] [W32/Tebit.A!tr.bdr]

Whois

PropertyValue
NameFax:
Organization Phone:
Address E-mail:
NameServer F1G1NS1.DNSPOD.NET